Linking Network Usage Patterns to Traffic Gaussianity Fit

Size: px
Start display at page:

Download "Linking Network Usage Patterns to Traffic Gaussianity Fit"

Transcription

1 Linking Network Usage Patterns to Traffic Gaussianity Fit Ricardo de O. Schmidt, Ramin Sadre, Nikolay Melnikov, Jürgen Schönwälder, Aiko Pras University of Twente, The Netherlands Aalborg University, Denmark Jacobs University Bremen, Germany Abstract Gaussian traffic models are widely used in the domain of network traffic modeling. The central assumption is that traffic aggregates are Gaussian distributed. Due to its importance, the Gaussian character of network traffic has been extensively assessed by researchers in the past years. In, researchers showed that the property of Gaussianity can be disturbed by traffic bursts. However, assumptions on network infrastructure and traffic composition made by the authors back in are not consistent with those of today s networks. The goal of this paper is to study the impact of traffic bursts on the degree of Gaussianity of network traffic. We identify traffic bursts, uncover applications and hosts that generate them and, ultimately, relate these findings to the Gaussianity degree of the traffic expressed by a goodness-of-fit factor. In our analysis we use recent traffic captures from and. Our results show that Gaussianity can be directly linked to the presence or absence of extreme traffic bursts. In addition, we also show that even in a more homogeneous network, where hosts have similar access speeds to the Internet, we can identify extreme traffic bursts that might compromise Gaussianity fit. Index Terms Traffic measurements, Gaussian modeling, Traffic analysis. I. INTRODUCTION Traffic modeling is widely used for network planning, deployment and management. Models are used to identify and characterize traffic for purposes ranging from security to network dimensioning. Since the 9 s, Gaussian traffic models have received special attention among researchers when studies revealed the presence of characteristics such as self-similarity and long-range dependence in modern network traffic [], [], []. It turned out that the fractional Brownian motion and other Gaussian models have many desirable properties for the modeling of IP traffic. The presence of long-range dependence and its long-term evolution were also studied in more recent studies, such as [4]. In this context, an important question is under what conditions network traffic can be assumed to be Gaussian. The Central Limit Theorem states that aggregated metrics, such as the amount of traffic transported per time unit on a network link, are normally distributed if a sufficiently large number of independent random variables are involved. Researchers have ISBN c 4 IFIP studied what a sufficiently large number could be. Previous works from [5] and 6 [6] studied the amount of horizontal aggregation (i.e., timescale for aggregating traffic) and vertical aggregation (i.e., number of hosts and amount of transferred traffic) needed to justify that the traffic offered in an arbitrary timescale is Gaussian. In our own work [7], we showed, by performing tests for a very long measurement period of six years, that it is safer to relate high Gaussianity to traffic bandwidth than to the number of users. A question quasi complementary to the above one was investigated in [8] in. The authors studied why some traffic is not Gaussian. They showed that network traffic can be decomposed into a beta part which is nearly Gaussian and strongly long-range dependent and an alpha part which constitutes a small fraction of the total traffic and which is responsible for traffic bursts. The authors showed that generally very few high-rate connections dominate during a burst and reasoned that the majority of them are due to large file transfers over fast links. With regard to modern network traffic, the work in [8] depicts several limitations. Being published in, it assumes a strongly heterogeneous infrastructure where Ethernet lines and slow 56k modems coexist. In fact, the fasted alpha traffic flow was more than 5 times faster than the slowest beta traffic flow. In addition, although it provided a successful model of the network traffic, it did not study the quantitative relationship between the presence of bursts and the degree of Gaussianity. Contribution. The goal of this paper is to study the impact of traffic bursts on the degree of Gaussianity of network traffic using recent traffic measurements. We apply the concept of alpha and beta traffic to an extensive set of traffic measurements from and. We identify the traffic bursts and analyze the applications and hosts that generated them. Furthermore, we link the bursts to the degree of Gaussianity of the traffic, expressed as the goodness of fit. In our study we consider timescales of ms and s, which dominate users perceived Quality of Service and, hence, are used for bandwidth provisioning approaches that often rely on Gaussian characteristic of traffic.

2 Organization. The remainder of this paper is organized as follows. In Sec. II we present the definition of Gaussianity used in this paper. In Sec. III we describe the network traffic datasets used in our experiments. In Sec. IV we describe the performed traffic analysis and the obtained results. We conclude the paper in Sec. V. II. GAUSSIANITY AND GOODNESS OF FIT In this section we present the methodology we used to assess the Gaussianity of network traffic. To comply with recent related work, the study presented in this paper uses the same methodology from previous works [5], [6], [7]. A. Definition of Gaussianity Consider L (T ),..., L n (T ) to be the amount of traffic in bytes observed in time periods,,..., n of length T, where T > defines the timescale of traffic aggregation. The traffic aggregate L(T ) is Gaussian if it follows a normal distribution, i.e., L(T ) Norm(ρ, σ ), where ρ is the average and σ is the estimated variance of L(T ) given by, respectively and ρ = n σ = n n L i (T ) i= n (L i (T ) ρ). i= B. Assessing Gaussianity of L(T ) Perhaps the most straightforward manner of assessing Gaussianity of samples is by means of quantile-quantile (Q-Q) plots. These plots provide a simple way to visually check whether a sample seems to be Gaussian or not. A Q-Q plot is created by plotting the inverse of the normal cumulative distribution function Norm(ρ, σ ) against the ordered statistics of the sampled data L(T ). Hence, the pairs for Q-Q plot are defined by ( Φ ( i n + ), α (i) ), i =,,..., n, () where Φ is the inverse of the normal cumulative distribution function, α (i) are the ordered traffic averages of L(T ), for each time bin of length T, and n the size of our sample (i.e., the number of time bins of size T ). Note that in Eq. (), for the inverse of the normal cumulative distribution function, the denominator n + is used instead of n because in normal distribution the th percentile is infinite. However, according to [9], [], for large sample sizes (i.e., large n) the difference of using one denominator or another is negligible. As mentioned above, Q-Q plots provide a good visual way to check whether a sample seems to be Gaussian or not. To quantify the Gaussianity goodness of fit for a large amount of samples, though, a more scalable approach is needed. To comply with previous works [5], [6], [7] we use the linear correlation coefficient, defined in []. The linear correlation coefficient is determined by n i= (x, y) = (x i x)(y i y) n i= (x i x) n i= (y i y), () where the pair (x, y) is given by Eq. (). That is, x is the inverse of the normal cumulative distribution function and y is the ordered statistics of traffic averages (i.e., α (i) ). It was showed in [6] that if the linear correlation coefficient is relatively high (e.g., > ), then the hypothesis that the underlying distribution is normal distributed is equivalent to a Kolmogorov-Smirnov test for normality at significance.5. There are other tests for normality. For example, the authors of [] extensively studied the performance of different tests and discussed their advantages and disadvantages for various situations (e.g., when the empirical distribution is bimodal or long-tailed). In order to make the results of this paper comparable to those found in earlier publications, especially [6], we use to express the degree of Gaussanity. Whenever a trace has we refer to it as a Gaussian trace and, oppositely, a trace with < is referred to as a not Gaussian trace (or non-gaussian). Given that we use a large amount of traffic traces in the experiments presented in this paper, we assess the Gaussianity goodness of fit of these traces by solely calculating the linear correlation coefficient for each trace individually. In the next sections we described the traffic datasets used in this analysis and present our experimental results. III. DATASETS AND TRAFFIC CHARACTERISTICS The datasets used in this work are comprised of packet-level traffic captures at three different links. These datasets comprise a total of 9 5-minute traces. Note that the trace duration of 5 minutes has been chosen in accordance with [6], [7], and that longer periods are generally not stationary due to the diurnal pattern. Moreover, our study focus on timescales of ms and s, which are of interest, for example, to bandwidth provisioning operations. Therefore, periods longer than 5 minutes might not be stationary enough for these timescales. These traces account for almost hours of capture time and more than 7.7 billion packets. Table I summarizes the used datasets. Note that the column length gives the total capture duration of all, not necessarily consecutive, 5-minute traces for each location. Also note that, although Table I presents the average link use for each location, such value is generally not constant over the measurement period. For all locations throughput varies due to diurnal traffic patterns. We briefly describe the three measurement locations and present traffic characteristics in the following. A. Datasets Locations ) Dataset from location B: In location B the traces were measured in a Gb/s up/down link at the core router of a university in the Netherlands. The link comprises all the incoming and outgoing traffic of the university. A total of approximately 886K IP addresses were observed during the

3 TABLE I SUMMARY OF MEASUREMENTS abbr. description year length # of hosts link capacity load B university border router in the Netherlands 6h 886k Gb/s % C university border router in Brazil 8h45m.5k 55 and 4 Mb/s 9% D backbone links interconnecting two cities in USA 5h M Gb/s % throughput (Gb/s) B C D location Fig.. Average traffic rate (throughput). Error bars show the minimum and maximum rate observed. average B C D location (a) T = ms average B C D location (b) T = s Fig.. Average for all traces in our datasets. Error bars show the standard deviation of..8 B C D all.8 B C D all.6.6 F() F() (a) T = ms (b) T = s Fig.. CDF of Gaussianity goodness of fit for all traces in our datasets. measured period and they generated an average link use of % (up to 5% in busiest hours). This is a full day measurement in which traffic was captured during the first 5 minutes of every full hour for a period of 4 hours. Therefore, this location comprises a total of 4 5-minute traces. ) Dataset from location C: The traces from location C were measured in the core router of a university in Brazil. The aggregate of two links of 55 Mb/s and 4 Mb/s was measured. It comprises traces collected during week days from September to December. Each trace corresponds to the first 5 minutes of every full hour between 8: and : inclusive. Most of the traffic at location C is web browsing and . ) Dataset from location D: Traces from dataset D are from the CAIDA public repository [], [4] and were measured between December and February. These traces were measured in a backbone link of a Tier ISP between the cities of San Jose and Los Angeles in the USA. The measured links have a total of Gb/s each. Approximately million unique IP addresses were observed during the monitored period. The links have an average load of %. B. Link Usage Table I presents the link load per location. However, this value is not constant overtime. Fig. shows the average traffic

4 rate per 5-minute trace for each location. The figure also shows the minimum and maximum values of mean rate per trace. Traffic variations for location C are the lower ones, but this is also the location with the less active hosts and link capacity. Traffic of location B is the one that varies most. That can be explained by the fact that this is a 4-hour measurement and, therefore, low averages are most likely to be from the overnight period, while high averages are from the day. Variations of rate in location C can also be explained by the hour of the day the measurement took place. Although location C does not have measurements from the overnight period, low averages are likely to be from the day shifts (e.g., : : and 7: 9:) in which students and staff of the university are not actively using the network. Traffic from location D is more stable traffic, as shown in Fig.. That might be expected since for this location measurements are months apart, but happened always during the same hour of the day. C. Traffic Gaussianity Using the methodology described in the previous section, we have computed for all traces in our datasets. Fig. shows the average and standard deviation of for all traces per location. As one can see, traffic in our datasets tends to be Gaussian, i.e., all averages are above the threshold >. Furthermore, one can see that the difference on average does not crucially change from T = ms (Fig. a) to T = s (Fig. b). However, averages may be misleading because for all locations we do have few traces with < and, therefore, are not Gaussian. In order to understand to which extend our traces are Gaussian, and also to support the Gaussianity analysis in the following section, Fig. shows the cumulative density function (CDF) of Gaussianity goodness of fit for all traces in our datasets. For T = ms, roughly 8% of all traces are not Gaussian. Clearly, most of them belong to location C, where around 4% of traces have. For T = s the number of non-gaussian traces is reduced to around % of all traces in our datasets. The majority of those is still from location C, where roughly 5% of traces are not Gaussian. The difference on Gaussianity fit for traces from location C between T = ms and T = s can be explained by the lower traffic rate in the measured links for this location. By reducing the size of the time bins (i.e., T ), the small amount of traffic from traces of location C is aggregated in a few bins, interspersed with empty bins without any network packets, ultimately resulting in an on/off-like behavior. As already shown in previous works [5], [7], this behavior considerably reduces the Gaussianity fit. However, as one observes in Fig., the opposite situation can also happen: some traces have poorer Gaussianity fit at larger T. This behavior has also been briefly explained in [7]. For such traces, traffic bursts at smaller timescales (e.g., T = ms) are very close to each other in time. Therefore, once we aggregate this traffic into larger bins (e.g., T = s), traffic of these bursts are grouped into few bins, resulting in bursts that reach much higher rates than the average rate of the trace. In the end, these few bins with exceptionally high rates disturb the Gaussianity fit at larger T. For a thorough study of the Gaussianity fit of the datasets used in this work, we refer to [7]. In the next section our analysis focuses on the differences between traces with low and high Gaussianity fit. IV. TRAFFIC ANALYSIS In this section we present a thorough analysis of traffic characteristics and their potential relationship to Gaussianity. We start by demonstrating the impact of bursts on the Gaussianity fit. Then, we show that these bursts are mostly related to single applications running in the network, and we also assess the impact of individual hosts on Gaussianity. Finally, we argue why identifying applications and linking them to the degree of Gaussianity of traffic is a quite complex and challenging task. A. Impact of Bursts on Gaussianity Normal distributed traffic is expected to have bursty and calm moments. By definition, if the traffic aggregate L i (T ) follows a normal distribution Norm(ρ, σ ), the probability that it exceeds x is given by the complementary CDF P (L i (T ) > x) = ( + erf ( x ρ σ )). () Fig. 4 shows the difference between two traces from location D with low and high Gaussianity fit, respectively. The curve in the bottom half of these plots shows the traffic aggregate of the sample traces over the measurement period of 5 minutes. Note that we have chosen T = s in this figure for visualization purposes, while we use T = ms and T = s in all other experiments. The trace from Fig. 4a has one of the highest Gaussianity fits in our datasets ( = 977). One can clearly see that traffic of this trace has regular ups and downs and in any moment a burst really protrudes from the baseline traffic. Contrariwise, Fig. 4b shows the traffic time series of one of the traces with the lowest degree of Gaussianity ( =.875) among all traces we have collected. In this case, one can easily notice the very high bursts during the time period 5 and at time 4. We have manually inspected and compared several traces with poor and good Gaussianity and noticed that such bursts are typical for poorly Gaussian traces. In order to assess this behavior systematically, we define a burst as a time bin where the traffic aggregate exceeds the threshold θ defined by θ = ρ + σ. (4) That is, θ is three standard deviations above the trace average rate ρ. A similar definition of burstiness has been used in [8], [5]. According to Eq. () this should only happen with probability.5 in perfect Gaussian traffic. The plots of Fig. 5 and 6 show for each trace of different locations, respectively at T = ms and T = s, its Gaussian fit and the percentage of time bins that exceed the above

5 # of hosts 5 4 5% 5% 9% 99% % throughput (Gb/s) throughput (a) Good Gaussian trace ( = 977) # of hosts throughput (Gb/s) % 5% 9% 99% % throughput (b) Bad Gaussian trace ( =.875) Fig. 4. Traffic aggregate and traffic shares at T = s for two sample traces from location D. threshold θ. In these plots, traces are sorted by their Gaussian fit, i.e., trace (left on the x-axis) is the trace with the lowest. Note that the traces positioning in the x-axis varies from T = ms to T = s due to their different values of at different T. That is, trace in Fig. 5a may not be the same as trace in Fig. 6a. Moreover, the colors of the background in these plots indicate the regions where <, < 5 and 5, respectively. These considerations are also valid for plots from Fig. 8 to. Although the resulting curves in these pltos depict strong fluctuations independently of T, we observe an inverse relationship between the amount of bursts exceeding the threshold and the Gaussian fit. That is, non-gaussian traces tend to have more bursts than Gaussian ones. This tendency is highlighted by the least-squares-fitted diagonal dotted line. Note that this is not a trivial outcome since non-gaussianity could be also caused by the absence of bursts. In fact, a few non-gaussian traces have a very small number of bursts. B. Impact of Applications on Gaussianity In the previous section we have shown the relationship between bursts and (non-)gaussianity. In this section, we want to study which applications are responsible for bursts. Note that we use the straightforward port-matching method for identifying applications. However, we are aware of the drawbacks of such method. Challenges related to traffic classification and its connection to Gaussianity are further discussed in Section IV-D. Fig. 7 shows the traffic aggregates of three sample traces (one from each location) with a low Gaussianity fit. The upper curve gives the aggregate of all traffic. We observe several bursts. For the trace from location B, the lower curve only shows the aggregate for traffic transferred on port 56 (i.e., NNTP). For the sample traces from locations C and D, the lower curve shows the aggregate of traffic transferred on ports 8 and 44 (i.e., HTTP and HTTPS, respectively). It can be seen that the protocol-specific curves follow closely the shape of the bursts for all the three examples. In fact, we have observed that typically a burst consists entirely of traffic

6 traces ordered by traces ordered by traces ordered by traces ordered by Fig. 5. traces ordered by Percentage of time bins with bursts at T = ms traces ordered by Fig. 6. Percentage of time bins with bursts at T = s throughput (Gbps) all traffic port 56 throughput (Gbps) all traffic ports 8,44 throughput (Gbps) all traffic ports 8, (a) Trace from B (b) Trace from C (c) Trace from D Fig. 7. Traffic aggregates at T = s and the port causing the bursts. from only one application and, hence, removing the specific traffic of such application from the trace would also remove the bursts. Note that all bursts in a trace are not necessarily caused by the same application. In order to validate this observation for the entire dataset, we have calculated for each burst that exceeds θ (as defined in Eq. 4) the share of the traffic on the most active port in the time bin of that burst, and computed an average share for all bursts of a trace. The plots in Fig. 8 and 9 show the resulting (average) traffic share, for T = ms and T = s respectively. Again, traces are sorted on the x-axis by their respective Gaussianity fit and the background color indicates the regions where <, < 5 and 5, respectively. We observe that for traces with low, the traffic bursts that exceed θ mainly consist of traffic from the most active ports, and that this relationship weakens with increasing. Note that the share never reaches %. Clearly, this is because the time bin containing the burst also contains normal

7 traces ordered by traces ordered by traces ordered by traces ordered by Fig. 8. Share of the most active applications in bursts at T = ms. Note the different scales of the y-axes traces ordered by traces ordered by Fig. 9. Share of the most active applications in bursts at T = s. Note the different scales of the y-axes baseline traffic. Furthermore, we observe a generally high share for all traces of location C. This is because HTTP(S) is the most dominant traffic at this location. C. Impact of Individual Hosts On Gaussianity The previous analysis has shown that bursts are caused by single applications. In this section we investigate how individual hosts contribute to the traffic in such bursts. The five curves in the top half of the plots in Fig. 4 show the absolute number of the most active hosts that are responsible for 5%, 5%, 9%, 99%, and % of the traffic sent in a given time bin. More formally, let b (t) b (t)... be the sorted number of bytes sent by the hosts in time bin t, i.e., b (t) is the number of bytes sent by the most active host in time bin t, b (t) is the number of bytes sent by the second most active host etc. The number q s (t) of the most active hosts responsible for a share s of the traffic in time bin t is defined as q s (t) = x min x, (5) i= bi s B(t) where B(t) is the total number of bytes sent in time bin t. One can see that while for the good Gaussian trace in Fig. 4a the number of users that are responsible for any share of the traffic remains quite constant over time. In any moment the number of contributing hosts drops considerably, not even during the highest traffic burst of this example trace, around 69s. On the contrary, for the trace with bad Gaussianity fit in Fig. 4b, the number of hosts that contribute to a certain share of traffic significantly drops during bursts. For example, during the burst at time 4s, only one host sends 5% of the traffic, which more or less corresponds to the difference between the.45 Gb/s peak throughput of the burst and the baseline throughput of.5 Gb/s, i.e., that burst is caused by traffic from one single host. Outside the bursts, a much larger number of hosts contribute to the 5% traffic share. In general, the non-bursty part of the traffic is in accordance with the observations made in [6] that typically 9 95% of IP traffic is generated by 5% of the sources. The authors of [6] also found bursts in their traffic but mostly connected them to attacks. However, after a manual inspection of several bursts, we consider it unlikely that the bursts in our traces are caused by malicious activities. The size of the bursts also makes them very unlikely to be caused by source-level bursts on packet level [7]. Again, we have validated this observation for the entire dataset. We have calculated for each burst higher than θ the

8 traces ordered by top- top- top traces ordered by top- top- top top- top- top traces ordered by top-.65 top- top traces ordered by top- top- top traces ordered by Fig.. Share of traffic for top-ips in bursts at T = ms top- top- top traces ordered by Fig.. Share of traffic for top-ips in bursts at T = s share of the most active host, the two most active hosts, and the five most active hosts to the traffic in that burst and computed the average shares for all bursts of a trace. The plots in Fig. and show the resulting traffic shares for each trace per location at T = ms and T = s, respectively. We observe for all traces that, independently of the Gaussianity fit, very few hosts are responsible for a significant amount of transferred traffic during the bursts. In some situations, at T = s, less than 5 hosts are responsible for more than 8% of all burst traffic in traces from location B and C and more than 5% in traces of D. D. Challenges on Traffic Classification In this paper we have identified applications to the level of protocol, e.g., HTTP(S), by matching the port numbers, e.g., 8 and 44. However, it is known that a plethora of applications are currently running on top of HTTP(S) and identifying those is not a straightforward task. Researches such as [8], [9] point out that the high rate of development of new applications and bad habits on implementing their communication blocks make traffic classification quite challenging. For example, many applications do not have IANA registered ports. Instead, they make use of well-known ports or tunneling to prevent detection and deceive filtering or firewalls. For instance, BitTorrent can also make use of random ports, complicating their identification by default communication ports. Sophisticated traffic classification almost precludes application identification with goals of Gaussianity assessment. That is, to ultimately have a kind of rule-of-thumb that would allow us to make assumptions on the degree of Gaussianity of a given traffic aggregate based on the mix of applications found within it seems to be more complex than simply measuring the traffic for a short period and performing the same operations as we have done in this paper (i.e., computing Gaussianity goodnessof-fit ). Nonetheless, we have shown that bursts of traffic tend to belong to a handful of hosts and being transferred on a very limited range of ports, even for large networks. Hence, we also see our work as a first contribution toward an applicationoriented method to assess the Gaussianity assumption: instead of performing a costly network-wide measurement on packetlevel, researchers or network operators would first identify hosts that contribute most to bursts in the main traffic and later explore further the applications that are being used by those hosts (i.e., to a higher level than the application protocol that they use).

9 V. CONCLUSION In this paper, we have shown by an extensive analysis of recent network measurements that the degree of Gaussianity of network traffic, expressed by a goodness-of-fit factor, is directly linked to the presence of extreme traffic bursts. While fairly Gaussian network traffic is mostly burst free, traffic with a low Gaussian fit is during up to.6% of its duration bursty. Furthermore, we have shown that these bursts are mostly created by single applications. In particular, traffic bursts at two of our measurement locations mostly consist of HTTP(S) traffic. We have also observed that bursts in traffic with a low Gaussian fit tend to consist of traffic from only one application. Finally, we have shown that the traffic inside bursts is sent from only a few hosts. Our results allow the conclusion that poor Gaussianity is caused by short but intensive activities of single network hosts. This suggests that the bursts are related to transfers of big files over fast links. Our findings confirm that the concept of alpha and beta traffic introduced by [8] in is still valid in recent network traffic. However, it is worth to note that two of our measurement locations were university core routers that connect a rather homogeneous set of hosts with identical or at least similar link speeds to the Internet. While the authors of [8] speculated that the diversity of clients could be a reason for the existence of alpha and beta traffic, our results indicate that the cause can probably be found in the characteristics of the servers. We plan to study this aspect in future work. It is important to keep in mind that, although measurements used in this work have very distinct users and traffic nature, our dataset is definitely not fully representative of the whole Internet traffic. Nonetheless, our conclusions certainly pave the way for additional research in this area. ACKNOWLEDGEMENTS This work has been partially funded by Flamingo, a Network of Excellence project (#8488) and by UniverSelf project (#575), both supported by the European Commission under its Seventh Framework Programme. REFERENCES [] W. E. Leland, M. S. Taqqu, W. Willinger, and D. V. Wilson, On the Self-Similar Nature of Ethernet Traffic (Extended Version), IEEE/ACM Transactions on Networking, vol., no., pp. 5, 994. [] V. Paxson and S. Floyd, Wide-Area Traffic: The Failure of Poisson Modeling, IEEE/ACM Transactions on Networking, vol., no., pp. 6 44, 995. [] I. Norros, A storage model with self-similar input, Queueing Systems, vol. 6, no. 4, pp , 994. [4] P. Borgnat, G. Dewaele, K. Fukuda, P. Abry, and K. Cho, Seven years and one day: Sketching the evolution of internet traffic, in Proceedings of IEEE INFOCOM 9, 9, pp [5] J. Kilpi and I. Norros, Testing the Gaussian approximation of aggregate traffic, in Proceedings of the nd ACM SIGCOMM Internet Measurement Workshop, ser. IMW,, pp [6] R. van de Meent, M. Mandjes, and A. Pras, Gaussian Traffic Everywhere? in Proceedings of the of the IEEE International Conference in Communications, ser. ICC 6, 6, pp [7] R. de O. Schmidt, R. Sadre, and A. Pras, Gaussian Traffic Revisited, in Proceedings of the th IFIP Networking Conference, ser. Networking,, pp. 9. [8] S. Sarvotham, R. Riedi, and R. Baraniuk, Connection-level Analysis and Modeling of Network Traffic, in Proceedings of the st ACM SIGCOMM Workshop on Internet Measurement, ser. IMW,, pp. 99. [9] L. Makkonen, Bringing Closure to the Plotting Position Controversy, vol. 7, no., 8, pp [] L. Makkonen, M. Pajari, and M. Tikanmäki, Closure to Problems in the extreme values analysis, vol. 4, no.,, pp [] B. M. Brown and T. P. Hettmansperger, Normal Scores, Normal Plots and Tests for Normality, Journal of the American Statistical Association, vol. 9, no. 46, pp , 996. [] T. Thadewald and H. Büning, Jarque-Bera test and its competitors for testing normality: A power comparison, ECONSTOR, handle.net/49/4999, Free University Berlin, School of Business & Economics, Tech. Rep. 4/9, 4. [] CAIDA, The CAIDA UCSD Anonymized Internet Traces Dec., \ dataset.xml, online. Accessed Nov.. [4], The CAIDA UCSD Anonymized Internet Traces Jan. 9 and Feb. 6, \ dataset.xml, online. Accessed Nov.. [5] K. Lan and J. Heidemann, A Measurement Study of Correlation of Internet Flow Characteristics, Computer Networks, vol. 5, no., pp. 46 6, 6. [6] A. Broido, Y. Hyun, R. Gao, and kc claffy, Their Share: Diversity and Disparity in IP Traffic, in Proceedings of the 5th International Passive and Active Network Measurement Workshop, ser. PAM 4, 4, pp. 5. [7] H. Jiang and C. Drovolis, Source-Level IP Packet Bursts: Causes and Effects, in Proceedings of the the rd ACM SIGCOMM Conference on Internet Measurement, ser. IMC,, pp. 6. [8] A. Tongaonkar, R. Keralapura, and A. Nucci, Challenges in Network Application Identification, in Proceedings of the 5th USENIX Conference on Large-Scale Exploits and Emergent Threats, ser. LEET,, pp.. [9] A. Dainotti, A. Pescapé, and K. C. Claffy, Issues and Future Directions in Traffic Classification, IEEE Network, vol. 6, no., pp. 5 4,.

Connection-level Analysis and Modeling of Network Traffic

Connection-level Analysis and Modeling of Network Traffic ACM SIGCOMM INTERNET MEASUREMENT WORKSHOP Connection-level Analysis and Modeling of Network Traffic Shriram Sarvotham, Rudolf Riedi, Richard Baraniuk Abstract Most network traffic analysis and modeling

More information

Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003

Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003 Internet Traffic Variability (Long Range Dependency Effects) Dheeraj Reddy CS8803 Fall 2003 Self-similarity and its evolution in Computer Network Measurements Prior models used Poisson-like models Origins

More information

Observingtheeffectof TCP congestion controlon networktraffic

Observingtheeffectof TCP congestion controlon networktraffic Observingtheeffectof TCP congestion controlon networktraffic YongminChoi 1 andjohna.silvester ElectricalEngineering-SystemsDept. UniversityofSouthernCalifornia LosAngeles,CA90089-2565 {yongminc,silvester}@usc.edu

More information

Network Performance Monitoring at Small Time Scales

Network Performance Monitoring at Small Time Scales Network Performance Monitoring at Small Time Scales Konstantina Papagiannaki, Rene Cruz, Christophe Diot Sprint ATL Burlingame, CA dina@sprintlabs.com Electrical and Computer Engineering Department University

More information

Examining Self-Similarity Network Traffic intervals

Examining Self-Similarity Network Traffic intervals Examining Self-Similarity Network Traffic intervals Hengky Susanto Byung-Guk Kim Computer Science Department University of Massachusetts at Lowell {hsusanto, kim}@cs.uml.edu Abstract Many studies have

More information

Time Series Analysis of Network Traffic

Time Series Analysis of Network Traffic Time Series Analysis of Network Traffic Cyriac James IIT MADRAS February 9, 211 Cyriac James (IIT MADRAS) February 9, 211 1 / 31 Outline of the presentation Background Motivation for the Work Network Trace

More information

Connection-level Analysis and Modeling of Network Traffic

Connection-level Analysis and Modeling of Network Traffic Connection-level Analysis and Modeling of Network Traffic Shriram Sarvotham, Rudolf Riedi, Richard Baraniuk Abstract Most network traffic analysis and modeling studies lump all connections together into

More information

NETWORK BURST MONITORING AND DETECTION BASED ON FRACTAL DIMENSION WITH ADAPTIVE TIME-SLOT MONITORING MECHANISM

NETWORK BURST MONITORING AND DETECTION BASED ON FRACTAL DIMENSION WITH ADAPTIVE TIME-SLOT MONITORING MECHANISM 686 Journal of Marine Science and Technology, Vol. 21, No. 6, pp.686-694 (213) DOI: 1.6119/JMST-13-516-1 NETWORK BURST MONITORING AND DETECTION BASED ON FRACTAL DIMENSION WITH ADAPTIVE TIME-SLOT MONITORING

More information

Measurement and Modelling of Internet Traffic at Access Networks

Measurement and Modelling of Internet Traffic at Access Networks Measurement and Modelling of Internet Traffic at Access Networks Johannes Färber, Stefan Bodamer, Joachim Charzinski 2 University of Stuttgart, Institute of Communication Networks and Computer Engineering,

More information

Vega VoIP Traffic Analysis and Selfsimilarity

Vega VoIP Traffic Analysis and Selfsimilarity A Traffic Analysis per Application in a real IP/MPLS Service Provider Network Paulo H. P. de Carvalho 1, Priscila Solís Barreto 1,2, Bruno G. Queiroz 1, Breno N. Carneiro 1, Marcio A. de Deus 1 1 Electrical

More information

Measuring Internet Evolution or... If we don t Measure, we don t Know What s Happening! Measurement WG, APAN 26, Queenstown, 2008

Measuring Internet Evolution or... If we don t Measure, we don t Know What s Happening! Measurement WG, APAN 26, Queenstown, 2008 Internet Evolution, Measurement WG, APAN 26, 2008 p. 1/32 Measuring Internet Evolution or... If we don t Measure, we don t Know What s Happening! Measurement WG, APAN 26, Queenstown, 2008 Nevil Brownlee

More information

Internet Management and Measurements Measurements

Internet Management and Measurements Measurements Internet Management and Measurements Measurements Ramin Sadre, Aiko Pras Design and Analysis of Communication Systems Group University of Twente, 2010 Measurements What is being measured? Why do you measure?

More information

Defending Against Traffic Analysis Attacks with Link Padding for Bursty Traffics

Defending Against Traffic Analysis Attacks with Link Padding for Bursty Traffics Proceedings of the 4 IEEE United States Military Academy, West Point, NY - June Defending Against Traffic Analysis Attacks with Link Padding for Bursty Traffics Wei Yan, Student Member, IEEE, and Edwin

More information

Characteristics of Network Traffic Flow Anomalies

Characteristics of Network Traffic Flow Anomalies Characteristics of Network Traffic Flow Anomalies Paul Barford and David Plonka I. INTRODUCTION One of the primary tasks of network administrators is monitoring routers and switches for anomalous traffic

More information

Research on Errors of Utilized Bandwidth Measured by NetFlow

Research on Errors of Utilized Bandwidth Measured by NetFlow Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic

More information

ON THE FRACTAL CHARACTERISTICS OF NETWORK TRAFFIC AND ITS UTILIZATION IN COVERT COMMUNICATIONS

ON THE FRACTAL CHARACTERISTICS OF NETWORK TRAFFIC AND ITS UTILIZATION IN COVERT COMMUNICATIONS ON THE FRACTAL CHARACTERISTICS OF NETWORK TRAFFIC AND ITS UTILIZATION IN COVERT COMMUNICATIONS Rashiq R. Marie Department of Computer Science email: R.R.Marie@lboro.ac.uk Helmut E. Bez Department of Computer

More information

Hybrid network traffic engineering system (HNTES)

Hybrid network traffic engineering system (HNTES) Hybrid network traffic engineering system (HNTES) Zhenzhen Yan, Zhengyang Liu, Chris Tracy, Malathi Veeraraghavan University of Virginia and ESnet Jan 12-13, 2012 mvee@virginia.edu, ctracy@es.net Project

More information

Probabilistic properties and statistical analysis of network traffic models: research project

Probabilistic properties and statistical analysis of network traffic models: research project Probabilistic properties and statistical analysis of network traffic models: research project The problem: It is commonly accepted that teletraffic data exhibits self-similarity over a certain range of

More information

An apparatus for P2P classification in Netflow traces

An apparatus for P2P classification in Netflow traces An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA

More information

Denial of Service and Anomaly Detection

Denial of Service and Anomaly Detection Denial of Service and Anomaly Detection Vasilios A. Siris Institute of Computer Science (ICS) FORTH, Crete, Greece vsiris@ics.forth.gr SCAMPI BoF, Zagreb, May 21 2002 Overview! What the problem is and

More information

Monitoring Large Flows in Network

Monitoring Large Flows in Network Monitoring Large Flows in Network Jing Li, Chengchen Hu, Bin Liu Department of Computer Science and Technology, Tsinghua University Beijing, P. R. China, 100084 { l-j02, hucc03 }@mails.tsinghua.edu.cn,

More information

Dynamics of Prefix Usage at an Edge Router

Dynamics of Prefix Usage at an Edge Router Dynamics of Prefix Usage at an Edge Router Kaustubh Gadkari, Daniel Massey, and Christos Papadopoulos Computer Science Department, Colorado State University, USA {kaustubh, massey, christos@cs.colostate.edu}

More information

Network Traffic Invariant Characteristics:Metering Aspects

Network Traffic Invariant Characteristics:Metering Aspects etwork Traffic Invariant Characteristics:Metering Aspects Vladimir Zaborovsky, Andrey Rudskoy, Alex Sigalov Politechnical University, Robotics Institute St.Petersburg, Russia; Fractel Inc., USA, E-mail:

More information

CoMPACT-Monitor: Change-of-Measure based Passive/Active Monitoring Weighted Active Sampling Scheme to Infer QoS

CoMPACT-Monitor: Change-of-Measure based Passive/Active Monitoring Weighted Active Sampling Scheme to Infer QoS CoMPACT-Monitor: Change-of-Measure based Passive/Active Monitoring Weighted Active Sampling Scheme to Infer QoS Masaki Aida, Keisuke Ishibashi, and Toshiyuki Kanazawa NTT Information Sharing Platform Laboratories,

More information

Capturing the Complete Multifractal Characteristics of Network Traffic

Capturing the Complete Multifractal Characteristics of Network Traffic Capturing the Complete Multifractal Characteristics of Network Traffic Trang Dinh Dang, Sándor Molnár, István Maricza High Speed Networks Laboratory, Dept. of Telecommunications & Telematics Budapest University

More information

A Passive Method for Estimating End-to-End TCP Packet Loss

A Passive Method for Estimating End-to-End TCP Packet Loss A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se

More information

Traffic Behavior Analysis with Poisson Sampling on High-speed Network 1

Traffic Behavior Analysis with Poisson Sampling on High-speed Network 1 Traffic Behavior Analysis with Poisson Sampling on High-speed etwork Guang Cheng Jian Gong (Computer Department of Southeast University anjing 0096, P.R.China) Abstract: With the subsequent increasing

More information

Detecting Network Anomalies. Anant Shah

Detecting Network Anomalies. Anant Shah Detecting Network Anomalies using Traffic Modeling Anant Shah Anomaly Detection Anomalies are deviations from established behavior In most cases anomalies are indications of problems The science of extracting

More information

Towards Modeling of Traffic Demand of Node in Large Scale Network

Towards Modeling of Traffic Demand of Node in Large Scale Network Towards Modeling of Traffic Demand of Node in Large Scale Network Kensuke Fukuda National Institute of Informatics Tokyo, -843, Japan kensuke@nii.ac.jp Abstract Understanding actual network and traffic

More information

Network Performance Measurement and Analysis

Network Performance Measurement and Analysis Network Performance Measurement and Analysis Outline Measurement Tools and Techniques Workload generation Analysis Basic statistics Queuing models Simulation CS 640 1 Measurement and Analysis Overview

More information

Application of Internet Traffic Characterization to All-Optical Networks

Application of Internet Traffic Characterization to All-Optical Networks Application of Internet Traffic Characterization to All-Optical Networks Pedro M. Santiago del Río, Javier Ramos, Alfredo Salvador, Jorge E. López de Vergara, Javier Aracil, Senior Member IEEE* Antonio

More information

In this whitepaper we will analyze traffic for the broadband access services that IIJ operates, and present our findings.

In this whitepaper we will analyze traffic for the broadband access services that IIJ operates, and present our findings. 2 2.1 Introduction In this whitepaper we will analyze traffic for the broadband access services that IIJ operates, and present our findings. It has been reported that growth in Internet traffic levels

More information

Traffic Measurements for Link Dimensioning

Traffic Measurements for Link Dimensioning Traffic Measurements for Link Dimensioning A Case Study Remco van de Meent, Aiko Pras, Michel Mandjes, Hans van den Berg, and Lambert Nieuwenhuis University of Twente PO Box 217 7500 AE Enschede The Netherlands

More information

On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 01003

On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 01003 On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 0003 Abstract The sizes of the BGP routing tables have increased by an order of magnitude

More information

Inference and Evaluation of Split-Connection Approaches in Cellular Data Networks

Inference and Evaluation of Split-Connection Approaches in Cellular Data Networks Inference and Evaluation of Split-Connection Approaches in Cellular Data Networks Wei Wei 1, Chun Zhang 1, Hui Zang 2, Jim Kurose 1, and Don Towsley 1 1 Department of Computer Science, University of Massachusetts,

More information

Characterization and Modeling of Packet Loss of a VoIP Communication

Characterization and Modeling of Packet Loss of a VoIP Communication Characterization and Modeling of Packet Loss of a VoIP Communication L. Estrada, D. Torres, H. Toral Abstract In this work, a characterization and modeling of packet loss of a Voice over Internet Protocol

More information

ANALYZING NETWORK TRAFFIC FOR MALICIOUS ACTIVITY

ANALYZING NETWORK TRAFFIC FOR MALICIOUS ACTIVITY CANADIAN APPLIED MATHEMATICS QUARTERLY Volume 12, Number 4, Winter 2004 ANALYZING NETWORK TRAFFIC FOR MALICIOUS ACTIVITY SURREY KIM, 1 SONG LI, 2 HONGWEI LONG 3 AND RANDALL PYKE Based on work carried out

More information

Network Monitoring Using Traffic Dispersion Graphs (TDGs)

Network Monitoring Using Traffic Dispersion Graphs (TDGs) Network Monitoring Using Traffic Dispersion Graphs (TDGs) Marios Iliofotou Joint work with: Prashanth Pappu (Cisco), Michalis Faloutsos (UCR), M. Mitzenmacher (Harvard), Sumeet Singh(Cisco) and George

More information

Master s Thesis. A Study on Active Queue Management Mechanisms for. Internet Routers: Design, Performance Analysis, and.

Master s Thesis. A Study on Active Queue Management Mechanisms for. Internet Routers: Design, Performance Analysis, and. Master s Thesis Title A Study on Active Queue Management Mechanisms for Internet Routers: Design, Performance Analysis, and Parameter Tuning Supervisor Prof. Masayuki Murata Author Tomoya Eguchi February

More information

Performance of Cisco IPS 4500 and 4300 Series Sensors

Performance of Cisco IPS 4500 and 4300 Series Sensors White Paper Performance of Cisco IPS 4500 and 4300 Series Sensors White Paper September 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of

More information

G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418

G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418 An Analytical Model to evaluate the Approaches of Mobility Management 1 G.Vijaya Kumar, *2 A.Lakshman Rao *1 M.Tech (CSE Student), Pragati Engineering College, Kakinada, India. Vijay9908914010@gmail.com

More information

modeling Network Traffic

modeling Network Traffic Aalborg Universitet Characterization and Modeling of Network Shawky, Ahmed Sherif Mahmoud; Bergheim, Hans ; Ragnarsson, Olafur ; Wranty, Andrzej ; Pedersen, Jens Myrup Published in: Proceedings of 6th

More information

NETWORK BURST MONITORING AND DETECTION BASED ON FRACTAL DIMENSION WITH ADAPTIVE TIME SLOT MONITORING MECHANISM

NETWORK BURST MONITORING AND DETECTION BASED ON FRACTAL DIMENSION WITH ADAPTIVE TIME SLOT MONITORING MECHANISM Journal of Marine Science and Technology DOI 10.6119/JMST-013-0516-1 This article has been peer reviewed and accepted for publication in JMST but has not yet been copyediting, typesetting, pagination and

More information

Voice Over IP Traffic - A Review of this Paper

Voice Over IP Traffic - A Review of this Paper IEEE TRANSACTIONS ON NEURAL NETWORKS, VOL. 16, NO. 5, SEPTEMBER 2005 1019 Load Characterization and Anomaly Detection for Voice Over IP Traffic Michel Mandjes, Iraj Saniee, Member, IEEE, and Alexander

More information

Trends and Differences in Connection-behavior within Classes of Internet Backbone Traffic

Trends and Differences in Connection-behavior within Classes of Internet Backbone Traffic MonNet a project for network and traffic monitoring Trends and Differences in Connection-behavior within Classes of Internet Backbone Traffic Wolfgang John, Sven Tafvelin and Tomas Olovsson Department

More information

Traffic analysis and network bandwidth provisioning tools for academic information networks

Traffic analysis and network bandwidth provisioning tools for academic information networks Progress in Informatics, No. 1, pp. 83-91, (005) 83 R&D Project Report Traffic analysis and network bandwidth provisioning tools for academic information networks Shunji Abe 1, Toru Hasegawa, Shoichiro

More information

DNS: a statistical analysis of name server traffic at local network-to-internet connections

DNS: a statistical analysis of name server traffic at local network-to-internet connections DNS: a statistical analysis of name server traffic at local network-to-internet connections Chris J. Brandhorst 1, Aiko Pras 2 1 Electrical Engineering, Mathematics and Computer Science, University of

More information

NETWORK REQUIREMENTS FOR HIGH-SPEED REAL-TIME MULTIMEDIA DATA STREAMS

NETWORK REQUIREMENTS FOR HIGH-SPEED REAL-TIME MULTIMEDIA DATA STREAMS NETWORK REQUIREMENTS FOR HIGH-SPEED REAL-TIME MULTIMEDIA DATA STREAMS Andrei Sukhov 1), Prasad Calyam 2), Warren Daly 3), Alexander Iliin 4) 1) Laboratory of Network Technologies, Samara Academy of Transport

More information

A Novel Framework for Improving Bandwidth Utilization for VBR Video Delivery over Wide-Area Networks

A Novel Framework for Improving Bandwidth Utilization for VBR Video Delivery over Wide-Area Networks A Novel Framework for Improving Bandwidth Utilization for VBR Video Delivery over Wide-Area Networks Junli Yuan *, Sujoy Roy, Qibin Sun Institute for Infocomm Research (I 2 R), 21 Heng Mui Keng Terrace,

More information

ABSTRACT Acknowledgments List of Abbreviations Contents ABSTRACT 3 Acknowledgments 5 List of Abbreviations 7 List of Figures 15 List of Tables 23 1 Introduction 25 2 Motivation and background 29 3 Overview

More information

A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems

A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems L. D Acunto, J.A. Pouwelse, and H.J. Sips Department of Computer Science Delft University of Technology, The Netherlands l.dacunto@tudelft.nl

More information

15-441: Computer Networks Homework 2 Solution

15-441: Computer Networks Homework 2 Solution 5-44: omputer Networks Homework 2 Solution Assigned: September 25, 2002. Due: October 7, 2002 in class. In this homework you will test your understanding of the TP concepts taught in class including flow

More information

Analyzing and modelling the AS-level Internet topology

Analyzing and modelling the AS-level Internet topology Analyzing and modelling the AS-level Internet topology Shi Zhou & Raul J. Mondragon Department of Electronic Engineering Queen Mary, University of London Mile End Road, London, E1 4NS, United Kingdom Email:

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,

More information

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks 2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh

More information

On the Use of Traffic Monitoring and Measurements for Improving Networking

On the Use of Traffic Monitoring and Measurements for Improving Networking On the Use of Traffic Monitoring and Measurements for Improving Networking Sílvia Farraposo 1, Philippe Owezarski 2, Edmundo Monteiro 3 1 Escola Superior de Tecnologia e Gestão de Leiria, Morro do Lena

More information

Detecting UDP attacks using packet symmetry with only flow data

Detecting UDP attacks using packet symmetry with only flow data University of Twente Department of Electrical Engineering, Mathematics an Computer Science Chair for Design and Analysis of Communication Systems Detecting UDP attacks using packet symmetry with only flow

More information

Traffic Modelling for Fast Action Network Games

Traffic Modelling for Fast Action Network Games to be published in Multimedia Tools And Applications 24 (MTAP) Traffic Modelling for Fast Action Network Games Johannes Färber University of Stuttgart, Inst. of Communication Networks and Computer Engineering

More information

Effects of Interrupt Coalescence on Network Measurements

Effects of Interrupt Coalescence on Network Measurements Effects of Interrupt Coalescence on Network Measurements Ravi Prasad, Manish Jain, and Constantinos Dovrolis College of Computing, Georgia Tech., USA ravi,jain,dovrolis@cc.gatech.edu Abstract. Several

More information

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India maharudra90@gmail.com,

More information

Analysis of Internet Topologies

Analysis of Internet Topologies Analysis of Internet Topologies Ljiljana Trajković ljilja@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science Simon Fraser University, Vancouver, British

More information

Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX

Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Martin Elich 1,3, Matěj Grégr 1,2 and Pavel Čeleda1,3 1 CESNET, z.s.p.o., Prague, Czech Republic 2 Brno University of Technology,

More information

VoIP QoS on low speed links

VoIP QoS on low speed links Ivana Pezelj Croatian Academic and Research Network - CARNet J. Marohni a bb 0 Zagreb, Croatia Ivana.Pezelj@CARNet.hr QoS on low speed links Julije Ožegovi Faculty of Electrical Engineering, Mechanical

More information

A Study of Internet Packet Reordering

A Study of Internet Packet Reordering A Study of Internet Packet Reordering Yi Wang 1, Guohan Lu 2, Xing Li 3 1 Department of Electronic Engineering Tsinghua University, Beijing, P. R. China, 100084 wangyi@ns.6test.edu.cn 2 China Education

More information

Cisco Integrated Services Routers Performance Overview

Cisco Integrated Services Routers Performance Overview Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,

More information

Universal Network Access Policy

Universal Network Access Policy Universal Network Access Policy Purpose Poynton Workmens Club makes extensive use of network ed Information Technology resources to support its research and administration functions and provides a variety

More information

Source Traffic Characterization for Thin Client Based Office Applications

Source Traffic Characterization for Thin Client Based Office Applications Source Traffic Characterization for Thin Client Based Office Applications Barbara Emmert, Andreas Binzenhöfer, Daniel Schlosser, and Markus Weiß University of Würzburg, Institute of Computer Science, Würzburg

More information

Detecting Spam at the Network Level

Detecting Spam at the Network Level Detecting Spam at the Network Level Anna Sperotto, Gert Vliek, Ramin Sadre, and Aiko Pras University of Twente Centre for Telematics and Information Technology Faculty of Electrical Engineering, Mathematics

More information

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)

More information

Joint Entropy Analysis Model for DDoS Attack Detection

Joint Entropy Analysis Model for DDoS Attack Detection 2009 Fifth International Conference on Information Assurance and Security Joint Entropy Analysis Model for DDoS Attack Detection Hamza Rahmani, Nabil Sahli, Farouk Kammoun CRISTAL Lab., National School

More information

Time-Series Models for Internet Data Traffic. Chun You and Kavitha Chandra

Time-Series Models for Internet Data Traffic. Chun You and Kavitha Chandra 1 Time-Series Models for Internet Data Traffic Chun You and Kavitha Chandra Center for Advanced Computation and Telecommunications Department of Electrical and Computer Engineering University of Massachusetts

More information

ABSTRACT 1.1 MEASUREMENT APPROACHES 1. INTRODUCTION 2. OCXMON/CORAL PASSIVE MONITORING OF INTERNET TRAFFIC AT SUPERCOMPUTING 98

ABSTRACT 1.1 MEASUREMENT APPROACHES 1. INTRODUCTION 2. OCXMON/CORAL PASSIVE MONITORING OF INTERNET TRAFFIC AT SUPERCOMPUTING 98 PASSIVE MONITORING OF INTERNET TRAFFIC AT SUPERCOMPUTING 98 Brynjar Åge Viken e mail: brynjar@item.ntnu.no, bviken@nlanr.net National Laboratory for Applied Network Research, Measurement and Operations

More information

A Statistical Method for Profiling Network Traffic

A Statistical Method for Profiling Network Traffic THE ADVANCED COMPUTING SYSTEMS ASSOCIATION The following paper was originally published in the Proceedings of the Workshop on Intrusion Detection and Network Monitoring Santa Clara, California, USA, April

More information

Packet Sampling and Network Monitoring

Packet Sampling and Network Monitoring Packet Sampling and Network Monitoring CERN openlab Monthly Technical Meeting 13 th November, 2007 Milosz Marian Hulboj milosz.marian.hulboj@cern.ch Ryszard Erazm Jurga ryszard.jurga@cern.ch What is Network

More information

Measuring Broadband America. Walter Johnston, Chief ECC Federal Communications Commission NANOG 10-6-14

Measuring Broadband America. Walter Johnston, Chief ECC Federal Communications Commission NANOG 10-6-14 Measuring Broadband America Walter Johnston, Chief ECC Federal Communications Commission NANOG 10-6-14 Disclaimer Views expressed in this presentation are those of the author and do not necessarily represent

More information

Nemea: Searching for Botnet Footprints

Nemea: Searching for Botnet Footprints Nemea: Searching for Botnet Footprints Tomas Cejka 1, Radoslav Bodó 1, Hana Kubatova 2 1 CESNET, a.l.e. 2 FIT, CTU in Prague Zikova 4, 160 00 Prague 6 Thakurova 9, 160 00 Prague 6 Czech Republic Czech

More information

Example: Credit card default, we may be more interested in predicting the probabilty of a default than classifying individuals as default or not.

Example: Credit card default, we may be more interested in predicting the probabilty of a default than classifying individuals as default or not. Statistical Learning: Chapter 4 Classification 4.1 Introduction Supervised learning with a categorical (Qualitative) response Notation: - Feature vector X, - qualitative response Y, taking values in C

More information

AUTONOMOUS NETWORK SECURITY FOR DETECTION OF NETWORK ATTACKS

AUTONOMOUS NETWORK SECURITY FOR DETECTION OF NETWORK ATTACKS AUTONOMOUS NETWORK SECURITY FOR DETECTION OF NETWORK ATTACKS Nita V. Jaiswal* Prof. D. M. Dakhne** Abstract: Current network monitoring systems rely strongly on signature-based and supervised-learning-based

More information

Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover

Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover 1 Multi-service Load Balancing in a Heterogeneous Network with Vertical Handover Jie Xu, Member, IEEE, Yuming Jiang, Member, IEEE, and Andrew Perkis, Member, IEEE Abstract In this paper we investigate

More information

VOLATILITY AND DEVIATION OF DISTRIBUTED SOLAR

VOLATILITY AND DEVIATION OF DISTRIBUTED SOLAR VOLATILITY AND DEVIATION OF DISTRIBUTED SOLAR Andrew Goldstein Yale University 68 High Street New Haven, CT 06511 andrew.goldstein@yale.edu Alexander Thornton Shawn Kerrigan Locus Energy 657 Mission St.

More information

A statistical approach to IP-level classification of network traffic

A statistical approach to IP-level classification of network traffic A statistical approach to IP-level classification of network traffic Manuel Crotti, Francesco Gringoli, Paolo Pelosato, Luca Salgarelli DEA, Università degli Studi di Brescia, via Branze, 38, 25123 Brescia,

More information

Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks

Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks Jerry Chou, Bill Lin University of California, San Diego Subhabrata Sen, Oliver Spatscheck AT&T Labs-Research USENIX Security

More information

Comparative Traffic Analysis Study of Popular Applications

Comparative Traffic Analysis Study of Popular Applications Comparative Traffic Analysis Study of Popular Applications Zoltán Móczár and Sándor Molnár High Speed Networks Laboratory Dept. of Telecommunications and Media Informatics Budapest Univ. of Technology

More information

On the Characteristics and Origins of Internet Flow Rates

On the Characteristics and Origins of Internet Flow Rates On the Characteristics and Origins of Internet Flow Rates Yin Zhang Lee Breslau AT&T Labs Research {yzhang,breslau}@research.att.com Vern Paxson Scott Shenker International Computer Science Institute {vern,shenker}@icsi.berkeley.edu

More information

Characterizing Data Services in a 3G Network: Usage, Mobility and Access Issues

Characterizing Data Services in a 3G Network: Usage, Mobility and Access Issues This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC proceedings Characterizing Data Services in a 3G Network: Usage,

More information

Bandwidth Management for Peer-to-Peer Applications

Bandwidth Management for Peer-to-Peer Applications Overview Bandwidth Management for Peer-to-Peer Applications With the increasing proliferation of broadband, more and more users are using Peer-to-Peer (P2P) protocols to share very large files, including

More information

Firewall Security: Policies, Testing and Performance Evaluation

Firewall Security: Policies, Testing and Performance Evaluation Firewall Security: Policies, Testing and Performance Evaluation Michael R. Lyu and Lorrien K. Y. Lau Department of Computer Science and Engineering The Chinese University of Hong Kong, Shatin, HK lyu@cse.cuhk.edu.hk,

More information

TRAFFIC control and bandwidth management in ATM

TRAFFIC control and bandwidth management in ATM 134 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 5, NO. 1, FEBRUARY 1997 A Framework for Bandwidth Management in ATM Networks Aggregate Equivalent Bandwidth Estimation Approach Zbigniew Dziong, Marek Juda,

More information

LCMON Network Traffic Analysis

LCMON Network Traffic Analysis LCMON Network Traffic Analysis Adam Black Centre for Advanced Internet Architectures, Technical Report 79A Swinburne University of Technology Melbourne, Australia adamblack@swin.edu.au Abstract The Swinburne

More information

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic

More information

Malware Detection in Android by Network Traffic Analysis

Malware Detection in Android by Network Traffic Analysis Malware Detection in Android by Network Traffic Analysis Mehedee Zaman, Tazrian Siddiqui, Mohammad Rakib Amin and Md. Shohrab Hossain Department of Computer Science and Engineering, Bangladesh University

More information

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications

VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications VoIP Network Dimensioning using Delay and Loss Bounds for Voice and Data Applications Veselin Rakocevic School of Engineering and Mathematical Sciences City University, London, UK V.Rakocevic@city.ac.uk

More information

An Architecture for the Self-management of Lambda-Connections in Hybrid Networks

An Architecture for the Self-management of Lambda-Connections in Hybrid Networks An Architecture for the Self-management of Lambda-Connections in Hybrid Networks Tiago Fioreze, Remco van de Meent, and Aiko Pras University of Twente, Enschede, the Netherlands {t.fioreze, r.vandemeent,

More information

A Hybrid Approach to Efficient Detection of Distributed Denial-of-Service Attacks

A Hybrid Approach to Efficient Detection of Distributed Denial-of-Service Attacks Technical Report, June 2008 A Hybrid Approach to Efficient Detection of Distributed Denial-of-Service Attacks Christos Papadopoulos Department of Computer Science Colorado State University 1873 Campus

More information

How To Send Video At 8Mbps On A Network (Mpv) At A Faster Speed (Mpb) At Lower Cost (Mpg) At Higher Speed (Mpl) At Faster Speed On A Computer (Mpf) At The

How To Send Video At 8Mbps On A Network (Mpv) At A Faster Speed (Mpb) At Lower Cost (Mpg) At Higher Speed (Mpl) At Faster Speed On A Computer (Mpf) At The Will MPEG Video Kill Your Network? The thought that more bandwidth will cure network ills is an illusion like the thought that more money will ensure human happiness. Certainly more is better. But when

More information

Evaluating the Performance and Accuracy of Network Traffic Management via Simulation Modelling in Heterogeneous Environment

Evaluating the Performance and Accuracy of Network Traffic Management via Simulation Modelling in Heterogeneous Environment 30 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.3, March 2008 Evaluating the Performance and Accuracy of Network Traffic Management via Simulation Modelling in Heterogeneous

More information

Attack and Defense Techniques 2

Attack and Defense Techniques 2 Network Security Attack and Defense Techniques 2 Anna Sperotto, Ramin Sadre Design and Analysis of ommunication Networks (DAS) University of Twente The Netherlands Firewalls Network firewall Internet 25

More information

Accelerated Simulation Method for Power-law Traffic and Non- FIFO Scheduling

Accelerated Simulation Method for Power-law Traffic and Non- FIFO Scheduling Accelerated Simulation Method for Power-law Traffic and Non- FIF Scheduling Authors: Sharifah H. S. Ariffin and John A. Schormans Department of Electronic Engineering, Queen Mary, University of London,

More information

Quality of Service versus Fairness. Inelastic Applications. QoS Analogy: Surface Mail. How to Provide QoS?

Quality of Service versus Fairness. Inelastic Applications. QoS Analogy: Surface Mail. How to Provide QoS? 18-345: Introduction to Telecommunication Networks Lectures 20: Quality of Service Peter Steenkiste Spring 2015 www.cs.cmu.edu/~prs/nets-ece Overview What is QoS? Queuing discipline and scheduling Traffic

More information